elopment of computer technology in the computer business has beenbased on a single mathematical computing document processing based on a simplelink to the internal network of internal business processes such as office automationto the development of enterprises based on the complexity of the intranet extranet The global Internet enterprise-class computer systems and dealing with the world ofbusiness and information-sharing deal. In the information processing capacity theability to link the system has been improved. But the link in the information capacitythe ability to improve circulation at the same time Web-based connections are alsobecoming more prominent security issues. This article from the following areas toexplore: First in an open network at the same time there are security issues . Internets openness as well as other factors led to the network environment thecomputer system is riddled with security problems. In order to address these securityissues a variety of safety mechanisms strategies and tools for research andapplication have been. However even in the use of existing tools and mechanisms forsecurity network security is still a great danger that these potential safety problemscan be attributed mainly to the following:a the limitations of security Each security mechanism must have the scope of the application and applicationenvironment. Firewall is an effective security tool which can be concealed within thestructure of the network to limit external network access to internal networks. But thevisit between the internal network the firewall is often powerless. Therefore theinternal network to the internal network between the invasion and the invasion ofcollusion it is very difficult to find a firewall and guard against.b security management mechanism Common safety management mechanism: the management of passwords avariety of key generation distribution and management reunification of the entirenetwork administrator authentication and authorization the establishment of asystem-wide assessment of the security system the establishment of the security auditsystem the establishment of systems and data Backup system the establishment ofsecurity incidents / security alarm and response mechanism to deal with plans theestablishment of specialized teams and the safety of the operation of the rapidresponse system and so on. In order to strengthen the system for disaster prevention and response capabilitybut also to develop contingency plans for catastrophic accidents such as anemergency action plan resources hardware software data etc. to back up andoperational plans systems and the resumption of testing methods.c the impact of security tools Security tools by the effects of man-made factors. A security tool to achieve thedesired effect to a large extent depends on the users including system administratorsand ordinary users improper use will generate insecurity. For example NT in areasonable setting can be achieved after the C2 level of security but very few peopleable to NTs own security policy for setting reasonable. In this regard though can stillscanning tool to detect whether the system was set up reasonable but the scan tool isbasically just a system based on a default security policy comparison for specificapplication e